Summary
I completed my PhD from the CSCAN Research Laboratory, Plymouth University, UK.
I completed his Bachelor of Technology and Master of Technology with distinctions in Computer Science and Engineering, India.
I am the Course Leader of Cybersecurity, Department of Computing. I am a member of IEEE, member of IEEE young professionals, member of IEEE IoT community and a Fellow of Higher Education Academy, UK.
-
About
I have teaching experience of 10 years in Networks, Network Socket Programming, Data Communication and Security.
As a researcher, I publish works in leading journals and conferences (IEEE, Elsevier, Springer, HTE etc) in the fields of Ad Hoc and Sensor Networks, Autonomous Vehicles, IoT security, Blockchain and Information Security.
I received the best paper award in 15th International Conference on Advance Computing and Communication, IEEE conferences, 2007. I am a reviewer of ETRI Journal, IEEE Transactions on Vehicular Technology, IEEE TVT Journal, Elsevier, Journal of Information Security and Applications, International Journal of Electrical and Computer Engineering (IJECE) and other leading IEEE conferences.
I am a technical member of various conferences including INC, CIIT, ICACNI etc. I also collaborate with various industries and other universities for research activities and actively take part in reviewing books and have written a book called Optimising Application Performance in Ad Hoc Networks: A Research Perspective, Lambert Academic publishing, Germany and contributed chapters for a book called Penetration Testing: A Manager’s Guide, BCS.
Specialist areas of interest
QoS and Security aspects in Ad Hoc Networks (MANET, VANET, Sensor Networks)
IoT (Smart Cities)
Safety and Security in Autonomous Vehicles
Intrusion Detection Systems
SDN and Bid Data -
Teaching
Business, Technology and Enterprise
Department of Computing
Science, Technology and Arts
Cybersecurity
Courses
Cybersecurity
Modules
Cybersecurity
Modules
Networking Fundamentals
Secure Networking Technologies
Wireless LAN Technologies
Network Intrusion Detection
Mobile Security
Cloud Technologies -
Research
Communication and Computing Research Centre
Research interest
QoS and Security in Ad Hoc Networks (MANET, VANET, Sensor Networks),
IoT security, Blockchain Technology, Safety and Security in Autonomous Vehicle Communication, and Intrusion Detection Systems. -
Publications
Journal articles
Otebolaku, A., Enamamu, T., Alfoudi, A., Ikpehai, A., Marchang, J., & Lee, G.M. (2020). Deep Sensing: Inertial and Ambient Sensing for Activity Context Recognition Using Deep Convolutional Neural Networks. Sensors, 20 (13), 3803. http://doi.org/10.3390/s20133803
Enamamu, T., Otebolaku, A., Marchang, J., & Dany, J. (2020). Continuous m-Health Data Authentication Using Wavelet Decomposition for Feature Extraction. Sensors, 20 (19), 5690. http://doi.org/10.3390/s20195690
Ingham, M., Marchang, J., & Bhowmik, D. (2020). IoT Security Vulnerabilities and Predictive Signal Jamming Attack Analysis in LoRaWAN. IET Information Security. http://doi.org/10.1049/iet-ifs.2019.0447
Marchang, J., Wang, J., Otebolaku, A., Enamamu, T., Porter, D., & Sanders, B. (2019). Multidimensional: User with File Content and Server’s status based Authentication for Secure File Operations in Cloud. Current Trends in Computer Sciences & Applications (CTCSA), 1 (5), 108-118. http://doi.org/10.32474/CTCSA.2019.01.000121
Marchang, J., Douglas, R., Ghita, B., Lancaster, D., & Sanders, B. (2018). Dynamic neighbour aware power-controlled MAC for multi-hop ad hoc networks. Ad hoc Networks, 75-76, 119-134. http://doi.org/10.1016/j.adhoc.2018.04.003
Marchang, J., Ghita, B., & Lancaster, D. (2017). Location based transmission using a neighbour aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks, 63, 62-78. http://doi.org/10.1016/j.adhoc.2017.06.001
Marchang, J., Ghita, B., & Lancaster, D. (2015). Dynamic queue utilization based MAC for multi-hop ad hoc networks. Infocommunications Journal, 7 (3), 25-32. http://www.infocommunications.hu/documents/169298/1598142/InfocomJ_2015_3_5_Marchang.pdf
Conference papers
Marchang, J., Ibbotson, G., & Wheway, P. (2019). Will Blockchain technology become a reality insensor networks? 2019 Wireless Days (WD). http://doi.org/10.1109/WD.2019.8734268
Marchang, J., Beavers, J., & Faulks, M. (2019). Hacking NHS Pacemakers: A Feasibility Study. 12th International Conference on Global Security, Safety & Sustainability. http://london.northumbria.ac.uk/event/icgs3-19/
Marchang, J., Sanders, B., & Joy, D. (2018). Adaptive V2V routing with RSUs and gateway support to enhance network performance in VANET. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10866, 298-310. http://doi.org/10.1007/978-3-030-02931-9_24
Sanders, B., & Marchang, J. (2016). A novel taxonomy of opportunities and risks in massively multiplayer online role playing games. In Proceedings of the International ACM conference on management of Digital Ecosystems, (pp. 90-98). ACM Digital Library: http://doi.org/10.1145/3012071.3012094
Marchang, J., Ghita, B., & Lancaster, D. (2016). Location based transmission using a neighbour aware-cross layer MAC for ad hoc networks. In Mamatas, L., Matta, I., Papadimitriou, P., & Yevgeni, K. (Eds.) WWIC 2016: Wired/Wireless Internet Communications, (pp. 15-27). Cham: Springer: http://doi.org/10.1007/978-3-319-33936-8_2
Marchang, J., Ghita, B., & Lancaster, D. (2015). Queue utilization with hop based enhanced arbitrary inter frame spacing MAC for saturated ad HOC networks. Proceedings of the 2015 14th Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2015, 1-8. http://doi.org/10.1109/MedHocNet.2015.7173170
Marchang, J., Ghita, B., & Lancaster, D. (2015). Dynamic Queue Utilization Based MAC for multi-hop Ad Hoc networks. Infocommunications Journal, 3 (3), 25-32. https://ieeexplore.ieee.org/document/7147719
Marchang, J., Ghita, B., & Lancaster, D. (2014). Hop-Based dynamic fair scheduler for wireless Ad-Hoc networks. 2013 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2013, 1-6. http://doi.org/10.1109/ANTS.2013.6802873
Kothari, S., Parmar, H., Das, E., Panda, N., Ahmed, A., & Marchang, J. (2011). HOST BASED INTRUSION DETECTION SYSTEM. 2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 875-878.
Kothari, S., Parmar, H., Das, E., Panda, N., Ahmed, A., & Marchang, J. (2010). Host Based Intrusion Detection System. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 336-339.
Marchang, J., Nandi, S., & Sarma, N. (2010). Prioritized quality of service support medium access control for real time flows. 2nd International Conference on Computer and Network Technology, ICCNT 2010, 298-302. http://doi.org/10.1109/ICCNT.2010.69
Marchang, J., S, S., Kumar, C., Islam, A., & N, S. (2008). Multi-Path Routing for Real Time Traffic with QoS Support.
Jims, M., Sarma, N., & Nandi, S. (2007). Priority Based Fairness Provisioning QoS-Aware MAC Protocol. 15th International Conference on Advanced Computing and Communications (ADCOM 2007). http://doi.org/10.1109/adcom.2007.98
Book chapters
Marchang, J., & Douglas, R. (2019). Selecting tools for penetration testing. In Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT: https://shop.bcs.org/store/221/detail/workgroup?id=3-221-9781780174082
Marchang, J., & Douglas, R. (2019). Scoping a penetration test. In Penetration Testing A Guide for Business and IT Management. BCS, The Chartered Institute for IT
Marchang, J., & Nandi, S. (2011). Need for cross layer in wireless multi hop ad-hoc networks. In Advanced Computing Applications, Databases and Networks. Alpha Science International Limited
Marchang, J., & Sharma, N. (2007). QoS in MAC layer of MANET. In National Conference on Trends in Advanced Computing NCTAC 2007. Narosa publishing house, New Delhi
Marchang, J., & Sarma, N. (2007). National Conference on Trends in Advanced Computing NCTAC 2007. In QoS in MAC layer of MANET. Narosa publishing house, New Delhi, India
Books
Marchang, J. (2017). Optimising Application Performance in Ad Hoc Networks. Germany: Scholars' Press. https://www.scholars-press.com/catalog/details//store/gb/book/978-620-2-30210-4/optimising-application-performance-in-ad-hoc-networks
-
Other activities
- Course Leader of Cybersecurity
- Organizing Open Days
- Supervising UG, PG and PhD
- Writing Research Proposals
- REF reading Team Member
- Support the Nuffield Foundation Placement
- Lead projects under SIP, Teaching Enhancement Grants etc.
- Invited Talks in Cybersecurity
- External Examiner
- Supervising local and International summer research intern
- Research collaboration with Companies, local Universities and overseas Universities
-
Postgraduate supervision
Supervise PG and PhD students in the field of IoT security, Blockchain Technology for IoT and Ad Hoc networks, secure DHCP designs for Dynamic Wireless Networks.